MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Discrete Mathematics knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
How many bits of message does the Secure Hash Algorithm produce? |
| A. | 160 bits |
| B. | 1035 bits |
| C. | 621 bits |
| D. | 3761 bits |
| Answer» B. 1035 bits | |
| 2. |
In a transposition cipher, the plaintext is constructed by the ________ of the ciphertext. |
| A. | permutation |
| B. | combination |
| C. | sequence |
| D. | series |
| Answer» B. combination | |
| 3. |
There are 67 people in a company where they are using secret key encryption and decryption system for privacy purpose. Determine the number of secret keys required for this purpose? |
| A. | 887 |
| B. | 6529 |
| C. | 2211 |
| D. | 834 |
| Answer» D. 834 | |
| 4. |
Using RSA algorithm what is the value of cipher test c if the plain text e = 7 and P = 5, q = 16 & n = 832. Determine the Euler’s totient function for the plain text? |
| A. | 47 |
| B. | 584 |
| C. | 428 |
| D. | 60 |
| Answer» E. | |
| 5. |
The public key of given user, in an RSA encryption system is e = 57 and n = 3901. What is the value of Euler’s totient function ϕ(n) for calculating the private key of the user? |
| A. | 4369 |
| B. | 3772 |
| C. | 871 |
| D. | 7892 |
| Answer» C. 871 | |
| 6. |
To encrypt a message _______ is used on the character’s positions. |
| A. | boolean algebra |
| B. | bijective function |
| C. | inverse function |
| D. | surjective function |
| Answer» C. inverse function | |
| 7. |
In a public key system, the cipher text received is C = 10 if RSA encryption used with a public key(e = 11, n = 77) to deduce the plain text. Determine the value of ϕ(n)? |
| A. | 49 |
| B. | 60 |
| C. | 123 |
| D. | 70 |
| Answer» C. 123 | |
| 8. |
The ROT13 caesar cipher system has an offset of ___________ |
| A. | 13 |
| B. | 45 |
| C. | 71 |
| D. | 37 |
| Answer» B. 45 | |
| 9. |
________ can decrypt traffic to make it available to all other network security functions such as web proxies. |
| A. | SSL visibility appliances |
| B. | RSA appliances |
| C. | Rodriguez cipher system |
| D. | Standard cipher system |
| Answer» B. RSA appliances | |
| 10. |
Suppose that there are two primes, P1 = 229 and p2 = 61. Find the value of z and Φ. |
| A. | 13969, 13680 |
| B. | 5853, 23452 |
| C. | 7793, 34565 |
| D. | 17146, 69262 |
| Answer» B. 5853, 23452 | |